Posts tagged for “Stealth”

Three Simple Steps to Combat Ransomware

Tom Patterson's tips for protecting against ransomware following Friday's attacks.

Posted by: on May 17th, 2017

Unisys Talks Cloud Security alongside AWS at IP Expo Europe
European Voices

The Unisys team is excited to be attending this year’s IP Expo Europe taking place from 5th – 6th October at London’s ExCeL centre. Come visit us at stand CC8 to learn all about the changing world of the digital enterprise and how our Stealth solution suite can lower risks and costs in the fight against cyber threats.

Posted by: on September 14th, 2016

Micro-Segmentation: Lowering the Cost and Risk of Network Security
European Voices

Unisys is a Platinum Sponsor at Gartner’s Security & Risk Summit in London. On the 12th – 13th September, Gartner’s Security and Risk Summit 2016 will be held at the InterContinental London at The O2.

Posted by: on September 8th, 2016

Three Game-changing Security Strategies That Put You Back in Control

There are three new game-changing security strategies that can deliver on a new approach, that understands security must be effective without being perfect, that it must embrace modern technology like clouds and mobile and IoT, and must support the new business models of integrated supply chains and customer self-service.

Posted by: on May 24th, 2016

Public Cloud Security: Completing the Jigsaw
Cloud Computing

Find out how enterprises can now leverage platforms such as AWS to host even their mission-critical business applications, and achieve significant savings on capital expenditure, without fear of introducing a new vector for threats and breaches.

Posted by: on May 6th, 2015

Data Center Security – Thinking Beyond Perimeter-based Defenses

It is clear that enterprises can now no longer rely on the traditional external defense mechanisms, and need to adopt a “defense-in-depth” approach coupled with innovative new approaches to securing their data centers.

Posted by: on November 14th, 2014

3 Tips for Critical Infrastructure Protection

For week three of National Cyber Security Awareness Month, we're providing three tips for critical infrastructure protection.

Posted by: on October 15th, 2014

Three Key Steps to Sensitive Data Protection

Discover three key activities that need to be accomplished for an effective sensitive data protection strategy.

Posted by: on September 4th, 2014

Sensitive Data Protection: 3 Reasons for the Vanishing Perimeter

Protecting sensitive data has become a complex proposition for a majority of organizations. The network perimeter of the past has vanished and data can no longer be contained, let alone protected.

Posted by: on June 25th, 2014

Protecting Sensitive Data and Networks
Executive Conversations

Protecting sensitive data and networks has become a complex proposition for a majority of organizations. Stealth provides proactive protection by cloaking servers and endpoints such that attackers cannot see the device to relegate an attack against.

Posted by: on June 5th, 2014

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.